Cybersecurity Tips

Don’t Let Hackers Win: How to Keep Your Applications Secure

Application security is a critical component of any company’s cybersecurity strategy. It is the process of identifying, identifying and mitigating risks and vulnerabilities in software applications and systems. In today’s digital age, where companies rely heavily on technology and the internet to conduct business, application security is needed more than ever to protect sensitive data, …

Don’t Let Hackers Win: How to Keep Your Applications Secure Read More »

Don’t be a Risky Business -Why Vendor Risk Assessments are Important

The What: Vendor risk assessments are an important part of managing the security and compliance of a company’s information technology systems. These assessments help organizations identify and mitigate risks associated with the use of third-party vendors and their products and services. In this article, we will discuss the reasons why a company should conduct vendor …

Don’t be a Risky Business -Why Vendor Risk Assessments are Important Read More »

PCI Compliance On A Penny

PCI Compliance On A Penny

We recently worked with a client to build a PCI compliance infrastructure in the cloud. Here are some key takeaways from that experience. Becoming PCI compliant is often perceived as a daunting task, as there are approximately 200 requirements that an organization needs to adhere to. However, just like Pareto’s 80-20 principle, here are some …

PCI Compliance On A Penny Read More »

Home Office Network Segmentation

Home Office Network Segmentation

Most of us who are working from home have a flat network that allows free co-mingling of malicious traffic with clean traffic. In the good old days when we used to commute to work, we would have noticed that payroll systems are isolated from user workstations that are isolated from production servers. The flat network …

Home Office Network Segmentation Read More »

Zero Trust In The Time Of Covid19

Zero Trust In The Time Of Covid19

What is Zero Trust Network? Zero Trust is somewhat like navigating through a high-security airport where we scan our ticket and validate our identity at multiple points of entry. It is about implementing and monitoring user-access control at a granular level. Zero Trust Network Access (ZTNA) ensures that only authorized users can access specific applications …

Zero Trust In The Time Of Covid19 Read More »

PV

Securing your Database

During a customary search for vulnerable databases, the team at Comparitech discovered a vulnerable and unprotected MongoDB database belonging to FarFaira, a website designed to promote literacy for children as young as 2 years old. The information on this database includes user sign-in information, email addresses, and social media tokens. That’s why database security is …

Securing your Database Read More »